Blog

Blog

Untrustworthy Email in Inboxes Reaches All-Time High

In Q1, the volume of emails classified as malicious or do not engage reached nearly a quarter of all reported emails. This is the highest combined volume of these categories since Fortra’s PhishLabs has documented this data point. Of those classified as malicious, threats considered email impersonation or, those lacking known signatures, made up a significant 98.7%. Every quarter, PhishLabs...
Blog

Data Privacy vs. Data Security: What’s the Difference?

Learn the Difference between Data Privacy and Data Security. Data privacy can’t happen without layered Data Security measures applied throughout the sensitive Data’s lifecycle.
Blog

A Beginners Guide to Protecting Your Data

In this blog, Steph Charbonneau, Senior Director of Industry Strategy at Fortra, talks you through some of the most valuable aspects of data protection and how to measure success of your organizational programs.
Blog

How to Meet Biden’s Executive Order on Cybersecurity Requirements

On May 12, 2021, President Biden issued an executive order designed to improve the nation’s cybersecurity and to better protect federal government networks. Learn more about the executive order in our blog.
Blog

Realize ROI with Robot

Robot has a reputation for providing high-quality systems management software and backing it up with great support. These additional benefits can help you justify the cost of automation at your company.
Blog

What Not to Do for IBM i Disaster Recovery

It may seem like common sense, but you’d be surprised how many organizations are still making these tape media mistakes. If this is you, there’s never been a better time to change your processes and improve IBM i disaster recovery!
Blog

Common Excuses for Not Automating

Whether it’s staffing, budget, or complexity, we’ve heard all the excuses to forgo automation. The next time you hear—or find yourself making—an excuse, have the response ready.